libseccomp 2.1.1-1ubuntu1~trusty4 source package in Ubuntu

Changelog

libseccomp (2.1.1-1ubuntu1~trusty4) trusty-proposed; urgency=medium

  * debian/libseccomp-dev.install: include static library
    (LP: #1703580)

 -- Michael Vogt <email address hidden>  Tue, 11 Jul 2017 12:22:18 +0200

Upload details

Uploaded by:
Michael Vogt
Uploaded to:
Trusty
Original maintainer:
Ubuntu Developers
Architectures:
i386 amd64 armhf armel
Section:
libs
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section

Downloads

File Size SHA-256 Checksum
libseccomp_2.1.1.orig.tar.gz 110.5 KiB 8812c11e407c383f5ad6afb84a88e5a0224477bcfe8ff03f0c548e5abaac841c
libseccomp_2.1.1-1ubuntu1~trusty4.debian.tar.xz 27.1 KiB 3c4af4b103ffa5f3432cff1037e44b4b773f17dc6f0e4884c89434dff3d4f0f5
libseccomp_2.1.1-1ubuntu1~trusty4.dsc 2.1 KiB b0987393a67e16eff39cc71a29dcc4f74375fe119aa40152e8ae92a377f6ce8b

View changes file

Binary packages built by this source

libseccomp-dev: high level interface to Linux seccomp filter (development files)

 This library provides a high level interface to constructing, analyzing
 and installing seccomp filters via a BPF passed to the Linux Kernel's
 prctl() syscall.
 .
 This package contains the development files.

libseccomp2: high level interface to Linux seccomp filter

 This library provides a high level interface to constructing, analyzing
 and installing seccomp filters via a BPF passed to the Linux Kernel's
 prctl() syscall.

libseccomp2-dbgsym: debug symbols for package libseccomp2

 This library provides a high level interface to constructing, analyzing
 and installing seccomp filters via a BPF passed to the Linux Kernel's
 prctl() syscall.

seccomp: helper tools for high level interface to Linux seccomp filter

 Provides helper tools for interacting with libseccomp. Currently, only
 a single tool exists, providing a way to easily enumerate syscalls across
 the supported architectures.

seccomp-dbgsym: debug symbols for package seccomp

 Provides helper tools for interacting with libseccomp. Currently, only
 a single tool exists, providing a way to easily enumerate syscalls across
 the supported architectures.